CVE-2009-4433

Multiple cross-site scripting (XSS) vulnerabilities in IDevSpot iSupport 1.8 and earlier allow remote attackers to inject arbitrary web script or HTML via the (a) 5 or (b) 9 field in a post action to ticket_function.php, reachable through ticket_submit.php and index.php; (c) the which parameter to function.php, or (d) the which parameter to index.php, related to knowledgebase_list.php. NOTE: some of these details are obtained from third party information.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:idevspot:isupport:*:*:*:*:*:*:*:*
cpe:2.3:a:idevspot:isupport:1.02:*:*:*:*:*:*:*
cpe:2.3:a:idevspot:isupport:1.06:*:*:*:*:*:*:*

History

21 Nov 2024, 01:09

Type Values Removed Values Added
References () http://packetstormsecurity.org/0912-exploits/isupport-lfixss.txt - Exploit () http://packetstormsecurity.org/0912-exploits/isupport-lfixss.txt - Exploit
References () http://secunia.com/advisories/37726 - Vendor Advisory () http://secunia.com/advisories/37726 - Vendor Advisory
References () http://www.exploit-db.com/exploits/10478 - Exploit () http://www.exploit-db.com/exploits/10478 - Exploit
References () http://www.osvdb.org/61109 - () http://www.osvdb.org/61109 -
References () http://www.osvdb.org/61111 - () http://www.osvdb.org/61111 -
References () http://www.osvdb.org/61112 - () http://www.osvdb.org/61112 -
References () http://www.securityfocus.com/bid/37380 - Exploit () http://www.securityfocus.com/bid/37380 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/54858 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/54858 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/54859 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/54859 -

Information

Published : 2009-12-28 19:00

Updated : 2024-11-21 01:09


NVD link : CVE-2009-4433

Mitre link : CVE-2009-4433

CVE.ORG link : CVE-2009-4433


JSON object : View

Products Affected

idevspot

  • isupport
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')